Networking Chapter 11 Cognero Page Name Class Date The Generic Sense Connection Has Uplinks

subject Type Homework Help
subject Pages 9
subject Words 2498
subject Authors Ed Tittel, James Pyles, Jeffrey L. Carrell

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 1
Indicate whether the statement is true or false.
1. When applications are written, they usually call functions in standard libraries that implement network tasks.
a.
True
b.
False
2. Most IPv4 drivers are old, which means that they are full of bugs.
a.
True
b.
False
3. The reasons for which a company is deploying IPv6 should not determine the due dates and project funding.
a.
True
b.
False
4. You do not have to perform IP subnetting in IPv6 because each subnet can support an extremely large
number of hosts.
a.
True
b.
False
5. Use of DHCPv6 for address assignment will result in a locally unique host identifier that changes when you
move to a different network.
a.
True
b.
False
Indicate the answer choice that best completes the statement or answers the question.
6. What feature of IPv6 enables you to perform minimal configuration on the router so that it advertises the
network prefix on the local link?
a.
Stateful configuration
b.
Source route addressing
c.
Stateless autoconfiguration
d.
Default route configuration
7. The current clear front-runner for most IPv4-to-IPv6 transitions is which of the following methods?
a.
dual-stack method
b.
6to4 method
c.
Teredo method
d.
ISATAP method
8. What component of BGP works much like private IP addresses?
a.
DMZs
b.
ASNs
c.
SLAs
d.
MTUs
page-pf2
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 2
9. Which of the following connections has uplinks to two or more switches, service providers, or other systems?
a.
multihomed connection
b.
external connection
c.
enterprise connection
d.
hub connection
10. Which tunneling method is a good choice if you must tunnel through a NAT using UDP, but a poor choice
based on performance issues?
a.
6to4
b.
Teredo
c.
ISATAP
d.
GRE
11. Which of the following are quite popular in legacy IPv4 networks because they solve several issues
regarding tracking and assignment of scarce resources and they facilitate DDNS?
a.
DHCPv6
b.
CMDBs
c.
IPAMs
d.
OOB gateways
12. Packets in IPv6 can be very large, such as jumbograms, and fragmentation is done by which of the
following?
a.
routers
b.
switches
c.
hosts
d.
intermediate systems
13. QoS in IPv6 is basically the same as which of the following in IPv4?
a.
diffserv
b.
CMDB
c.
FCoE
d.
SLA
14. Which of the following is accomplished via a new version of DHCP known as DHCPv6?
a.
Stateless address autoconfiguration
b.
Stateful address autoconfiguration
c.
Aware address autoconfiguration
d.
Awareless address autoconfiguration
15. If you need to tunnel through NAT, using UDP is a good choice, which could mean using which of the
following?
page-pf3
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 3
a.
IPSec
b.
ISATAP
c.
Teredo
d.
6to4
16. Which of the following keeps track of the configuration of your network devices and let you know if
something changes?
a.
DHCPv6
b.
CMDBs
c.
OOB gateways
d.
IPAMs
17. Which of the following is a proxy server or terminal server that has one interface on the production network
for you to access a terminal via Secure Shell (SSH) or access a virtual desktop?
a.
jump box
b.
bastion host
c.
OOB gateway
d.
IPAM
18. Tunnels that are created and destroyed by the protocol, without having an administrator manually involved,
are known as which of the following?
a.
private tunnels
b.
configured tunnels
c.
self-managed tunnels
d.
automatic tunnels
19. Which of the following is an IT environment isolated from the production environment?
a.
sandbox
b.
playbox
c.
virtual network
d.
virtual domain
20. What is another name for static tunnels?
a.
private tunnels
b.
configured tunnels
c.
automatic tunnels
d.
self-managed tunnels
21. ISATAP requires all hosts to be which of the following?
a.
single stack
b.
mono stack
c.
home stack
page-pf4
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 4
d.
dual stack
22. What is the most commonly used exterior gateway protocol?
a.
OSPF
b.
EIGRP
c.
BGP
d.
RIP
23. In IPv6, which of the following is the ability to move from one network to another while retaining an IP
address and ongoing sessions?
a.
mobility
b.
summarization
c.
multihoming
d.
single-homing
24. Network layer protocol functionality on hosts is mostly deployed as software in the form of which of the
following?
a.
ASICs
b.
NICs
c.
firmware
d.
drivers
25. Which of the following allows you to reduce the size of the routing table by having one large prefix entry
point the way to many smaller ones that share the same next hop?
a.
Clustering
b.
Chaining
c.
Multihoming
d.
Summarization
26. When deploying IPv6, which of the following is considered perhaps the most critical and difficult task?
a.
acquiring IPv6 addresses
b.
creating a computer inventory
c.
working with providers
d.
application remediation
Enter the appropriate word(s) to complete the statement.
27. A(n) _____ occurs when an organization buys another organization and combines assets.
28. The _____ table holds all Internet address prefixes for the default-free zone.
29. _____ are a list of conditions used to define whether an activity has completed successfully or not.
page-pf5
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 5
30. In the generic sense, a(n) _____ connection has uplinks to a single switch, service provider, or other system.
31. IPv6 includes a(n) _____, which is a portion of the IPv6 header used for QoS.
Match each item with a statement below.
a.
proprietary
b.
jump box
c.
Default-free zone (DFZ)
d.
automatic tunnel
e.
failure domain
f.
flow
g.
configured tunnel
h.
promote
i.
sandbox
32. an IT component that is not standards based and usable by anyone without license
33. a type of bastion host that is usually a terminal server or proxy server that allows administrators to access
systems in another network without actually having direct network connectivity
34. a set of all the Internet networks that are operated without a default route
35. an IPv6 tunnel created and destroyed by the protocol when needed, without having an administrator
manually involved
36. the collection of IT components in the environment that are disrupted by a single component failure
37. a conversation between two end points in which all the packets in the flow have the same source and
destination addresses and the same Transport layer headers
38. an IPv6 tunnel that an administrator creates manually
39. the act of moving an IT component from one life cycle stage or environment to the next
40. an IT environment that is isolated from the production network for the purpose of testing or containing
things that could disrupt service on the production network
41. What are some of the reasons for considering tunneling options when deploying IPv6?
42. Why is a test lab critical when deploying IPv6?
43. What are some of the security-related decisions you will need to make to deploy IPv6?
44. Describe the process of updating to DHCPv6.
page-pf6
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 6
45. Briefly describe how to start migrating applications during IPv6 deployment.
46. What are some of the architectural decisions that you need to make when deploying IPv6?
47. Describe two ways to handle the IPv4-to-IPv6 migration process.
48. How do you select a router vendor for IPv6?
49. How does the lack of IPv4 addresses affect the deployment of IPv6?
50. How does the nature of networks affect the deployment of IPv6?
page-pf7
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 7
page-pf8
Name:
Class:
Date:
page-pf9
Name:
Class:
Date:
page-pfa
Name:
Class:
Date:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.